General

  • Target

    6c0dc941cf174c474ea4df5fc6ae1236e61050c40cdae384294429ff726c7c28

  • Size

    331KB

  • Sample

    220117-2a8xdsdfhm

  • MD5

    e3708b70a0727faa38255877175e229d

  • SHA1

    dafe5c3dc29da200b7ee769496204ec54e9f024c

  • SHA256

    6c0dc941cf174c474ea4df5fc6ae1236e61050c40cdae384294429ff726c7c28

  • SHA512

    06946f9a91da10dbc58b15db691ff74ce9fd1b9630f8831d2699be2b48b533755564c739b2933e39026cfddaeff976cd1e70276975829d8ba05be341fde3b347

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Targets

    • Target

      6c0dc941cf174c474ea4df5fc6ae1236e61050c40cdae384294429ff726c7c28

    • Size

      331KB

    • MD5

      e3708b70a0727faa38255877175e229d

    • SHA1

      dafe5c3dc29da200b7ee769496204ec54e9f024c

    • SHA256

      6c0dc941cf174c474ea4df5fc6ae1236e61050c40cdae384294429ff726c7c28

    • SHA512

      06946f9a91da10dbc58b15db691ff74ce9fd1b9630f8831d2699be2b48b533755564c739b2933e39026cfddaeff976cd1e70276975829d8ba05be341fde3b347

    Score
    10/10
    • Arkei

      Arkei is an infostealer written in C++.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Arkei Stealer Payload

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks